US20200089915A1 - Method and apparatus for tamper-proof storage of information in respect of object-related measures - Google Patents

Method and apparatus for tamper-proof storage of information in respect of object-related measures Download PDF

Info

Publication number
US20200089915A1
US20200089915A1 US16/495,116 US201816495116A US2020089915A1 US 20200089915 A1 US20200089915 A1 US 20200089915A1 US 201816495116 A US201816495116 A US 201816495116A US 2020089915 A1 US2020089915 A1 US 2020089915A1
Authority
US
United States
Prior art keywords
transaction
blockchain
data memory
block
transactions
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US16/495,116
Other languages
English (en)
Inventor
Rainer Falk
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Siemens AG
Original Assignee
Siemens AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siemens AG filed Critical Siemens AG
Assigned to SIEMENS AKTIENGESELLSCHAFT reassignment SIEMENS AKTIENGESELLSCHAFT ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FALK, RAINER
Publication of US20200089915A1 publication Critical patent/US20200089915A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • H04L2209/38

Definitions

  • Objects for example devices, device components or other products, may comprise an object data memory for storing various information items in relation to the relevant object.
  • data in respect of the identity of the object or of other processes relating to the object can be stored in the object data memory of an object.
  • diagnostic data, servicing information data, repair information data or details of transferred ownership can be stored in an object data memory of the object.
  • the object data memory of an object can be integrated in the object or can be physically connected to the object. Alternatively, the object data memory can also be situated at a distance from the object and can be assigned to the object.
  • information or data in respect of the object can be stored as a so-called digital twin or as part of a digital twin on a distant computer system, more particularly a web service or an IoT backend system.
  • a web service or an IoT backend system Particularly in the case of security-critical applications, it is necessary to protect the data stored in the object data memory of an object against tampering.
  • this aspect is achieved by a method and a system for tamper-proof storage of information in respect of object-related measures, having the features specified in the patent claims.
  • the measures relating to the object are contained as transactions in transaction blocks that are linked together in a transaction blockchain of the object, the transaction blockchain being stored in an object data memory assigned to the object.
  • the transaction blocks of the transaction blockchain of the object may be linked together by way of a cryptographic hash function. This embodiment offers the advantage of further increasing the protection against tampering.
  • An associated individual hash function can be used for each object.
  • the protection against tampering is further increased.
  • An associated hash function can be used for a plurality of objects of a group of objects. This offers the advantage of a reduction in management outlay in the method according to embodiments of the invention.
  • the transaction blocks of the transaction blockchain of the object can be linked together by way of pointer addresses. This offers the advantage of a simple implementation.
  • Each transaction block may comprise at least one transaction, which specifies a measure undertaken on the object or a measure undertaken by the object itself. This embodiment offers the advantage of saving memory space.
  • An additional transaction block for the transaction blockchain of the object can be generated automatically as soon as a predetermined time period ends. This offers the advantage of simplifying the management of the stored data.
  • An additional transaction block for the transaction blockchain of the object can be generated automatically as soon as the number of transactions contained in the last transaction block of the transaction blockchain reaches a threshold. This likewise offers the advantage of simplifying the management of the data.
  • An additional transaction block for the transaction blockchain of the object can be generated automatically as soon as a certain event is detected. This likewise offers the advantage of simplifying the management of the data.
  • An additional transaction block for the transaction blockchain of the object can be generated automatically as soon as a corresponding user command is entered via an interface. This offers the advantage of allowing a user to prompt the generation of an additional transaction block.
  • a transaction can be selected from a group of predetermined transactions that are admissible for the object and the transaction can be stored in the last transaction block of the transaction blockchain. This offers the advantage of being able to predefine transactions.
  • Each transaction block of the transaction blockchain may contain a timestamp, a digital signature and/or proof-of-work evidence. This offers the advantage of further increasing the protection against tampering.
  • an additional transaction block can be linked to the last transaction block situated at the end of the transaction blockchain of the object. This likewise offers the advantage of increasing the protection against tampering.
  • Each transaction contains a validation program code or is assignable to a validation program code. This offers the advantage of the method according to embodiments of the invention being flexibly adaptable to various use cases.
  • An additional transaction block can be validated as valid should all transactions contained in the transaction block be verified as admissible by means of an associated validation program code. This offers the advantage of further increasing the protection against tampering.
  • a transaction, or each transaction, of a transaction block may have a public key of an object owner and a specification of a key algorithm used for a digital signature. This likewise offers the advantage of further increasing the protection against tampering.
  • the transaction blockchain of an object can be read from the object data memory of the object by means of a read device and the transactions contained in the transaction blocks of the read transaction blockchain are verified as admissible on the basis of their respective validation program code.
  • a transaction verified as admissible on the basis of its validation program code at the time of writing to the object data memory of the object and/or at the time of reading from the object data memory of the object can automatically trigger the corresponding measure on the object or confirms the measure being undertaken on the object.
  • This likewise offers the advantage of the method according to embodiments of the invention being flexibly usable in a multiplicity of different use cases.
  • a plurality of transaction blocks of the transaction blockchain of an object can be automatically combined to form a transaction block as soon as a predetermined time period ends or as soon as the number of transaction blocks contained in the transaction blockchain reaches a threshold or in response to a detected event, in particular when memory in the object data memory runs low, or in response to an entered user command. This offers the particular advantage of minimizing the required memory space.
  • a system for controlling and monitoring measures that can be undertaken on objects or that can be undertaken by objects themselves, wherein an object data memory is assigned to each object of the system, wherein the measures relating to the object are contained as transactions in transaction blocks that are linked together in a transaction blockchain of the object, the transaction blockchain being stored in the object data memory of the object.
  • the objects may comprise hardware components, more particularly devices. This offers the advantage of the system according to embodiments of the invention being employable in an industrial installation, in particular.
  • the objects may comprise software components, in particular utility software. This offers the advantage of the system according to embodiments of the invention also being able to be used in a software system.
  • FIG. 1 shows a schematic block diagram for explaining the functionality of the method according to embodiments of the invention and the apparatus according to embodiments of the invention for tamper-proof storage of information in respect of object-related measures;
  • FIG. 2 shows a schematic illustration for explaining possible embodiments of a system according to embodiments of the invention for controlling and monitoring object-related measures
  • FIG. 3 shows a schematic illustration of a transaction blockchain usable in the method according to embodiments of the invention and the system according to the invention
  • FIG. 4 shows a schematic illustration of an exemplary embodiment of a transaction contained within a transaction block of the transaction blockchain, as may be used in the method according to embodiments of the invention and the system according to embodiments of the invention;
  • FIG. 5 shows a flowchart for illustrating a write process undertaken in the method according to embodiments of the invention.
  • FIG. 6 shows a flowchart for illustrating a read process undertaken in the method according to embodiments of the invention.
  • an object 1 comprises an associated object data memory 2 .
  • the object data memory 2 of the object 1 is integrated or contained in the object 1 .
  • the object data memory 2 may also be provided at a distance from the associated object 1 , for example in a distant data memory or a distant database.
  • the object data memory 2 is assignable to the object by way of an ID of the object 1 .
  • data can be written to the object data memory 2 and/or data can be read from the object data memory 2 with the aid of a portable write and read device 3 .
  • the object 1 can be a device, for example a smart drive.
  • the object 1 may be a hardware component or a plurality of assembled hardware components.
  • the object 1 is a device of an industrial installation.
  • Examples for objects that may comprise an object data memory 2 include controllers, programmable logic controllers, sensors, actuators, input/output modules, transmissions, turbines, motors, converters, computed tomography scanners, mammography devices, ultrasonic devices or circuit breakers.
  • the object 1 can also be a software component, more particularly utility software.
  • the software component can be a factory service, a management service or a cloud service, for example.
  • an object data memory 2 is assignable to each software component of the system.
  • At least one transaction blockchain TBK Situated in the object data memory 2 of an object 1 , there is at least one transaction blockchain TBK, as illustrated in, e.g., FIG. 3 , provided for the object 1 .
  • Any measure relating to the object 1 is noted as a transaction T in a transaction block TB of the transaction blockchain TBK.
  • the measures relating to the object 1 are contained as transactions T in transaction blocks TB, which are linked together in the transaction blockchain TBK of the relevant object 1 .
  • This transaction blockchain TBK is stored in an object data memory 2 assigned to the object 1 .
  • Each transaction block TB of the transaction blockchain TBK comprises at least one transaction T, which specifies a measure undertaken on the object 1 or specifies a measure undertaken by the object 1 itself.
  • the transaction blocks TB of the transaction blockchain TBK of the object 1 are linked together by way of a cryptographic hash function H.
  • the transaction block TB that forms a data structure comprises at least one hash value that is formed as a function of the preceding transaction block TB.
  • Each transaction block TB contains one or more transactions T, as illustrated in FIG. 3 .
  • Each transaction T within a transaction block TB specifies a measure undertaken on the object 1 , for example a servicing measure, or a measure undertaken by the object 1 itself, for example a production step.
  • a hash value can be formed as a function of the transactions T.
  • the number of transactions T contained in a transaction block TB may differ.
  • the first transaction block TB 1 of the transaction blockchain TBK illustrated in FIG. 3 contains n 1 transactions T and the second transaction block TB 2 of the transaction blockchain TBK contains n 2 transactions T.
  • Each transaction block TB contains at least one transaction T in respect of an object-related measure.
  • an associated individual hash function H is used for each object 1 .
  • an associated hash function F can be used for a plurality of objects of a group of objects.
  • the transaction blocks TB of the transaction blockchain TBK are linked together by way of a cryptographic hash function H.
  • the transaction blocks TB of the transaction blockchain TBK of the object 1 may also be linked together by way of pointer addresses.
  • the transaction blocks TB of the transaction blockchain TBK are linked in one direction.
  • the transaction blocks TB of the transaction blockchain TBK may also be linked together twofold in both directions. This allows the insertion and removal of transaction blocks TB from the transaction blockchain TBK.
  • an additional transaction block TB for the transaction blockchain TBK of the object 1 is generated automatically as soon as certain circumstances occur.
  • an additional transaction block TB for the transaction blockchain TBK of the object 1 is generated automatically as soon as a predetermined time period ends.
  • an additional transaction block TB for the transaction blockchain TBK is automatically generated at periodic time intervals, for example every 24 hours.
  • an additional transaction block TB for the transaction blockchain TBK of an object 1 is generated automatically as soon as the number of transactions T contained in the last transaction block TB of the transaction blockchain TBK reaches a certain threshold or takes up a certain amount of memory space.
  • an additional transaction block TB for the transaction blockchain TBK of the object 1 is generated automatically as soon as a certain event is detected.
  • the object 1 may comprise, e.g., sensors for detecting events.
  • the event may also be a change in the state of the object 1 , for example.
  • the detected event that caused the generation of a transaction block TB may be an internal event within the object 1 or an external event outside of the object 1 .
  • an additional transaction block TB for the transaction blockchain TBK of the object 1 is generated automatically as soon as a corresponding command, more particularly a user command, is received.
  • a user or operator of the object 1 can enter a user command via an interface, the user command leading to an additional transaction block TB for the transaction blockchain TBK of the object 1 being generated automatically.
  • a transaction T can be selected from a group of predetermined transactions T that are admissible for the object 1 and the transaction can be stored in the last transaction block TB of the transaction blockchain TBK of the object 1 .
  • Different objects 1 or devices may have different admissible transactions T for object-related measures.
  • the various object-related measures can be indicated to a user or operator of the installation and the user has the option of selecting object-related measures and the associated transaction T by way of a user interface.
  • the object-related measure is a measure undertaken by the object 1 itself or a measure undertaken on the object 1 .
  • FIG. 4 shows a possible exemplary data structure of a transaction T that may be contained within a transaction block TB of the transaction blockchain TBK.
  • Each transaction T may comprise one or more of the data fields illustrated in FIG. 4 .
  • the owner or the responsible organization for the object 1 (ownership) OWN is contained in the transaction T.
  • the relevant object-related measure MAS may be contained in the transaction T.
  • a result ERG of the measure is also specified.
  • a self-test measure there may be a specification as to whether the self-test was carried out successfully (okay) or not (not okay).
  • the transaction T may contain a date DAT and a timestamp TS.
  • the date DAT and the timestamp TS are, e.g., the time at which the object-related measure was undertaken.
  • the transaction T may specify, for example, a public key ok, (public key) of an object owner and the specification of a key algorithm (ALG) used for a digital signature SIG.
  • ALG key algorithm
  • a curve form CUR of an elliptic curve used in the encryption algorithm ALG may be specified, for example.
  • the transaction T contains a validation program code VPC or is at least assignable to a validation program code VPC.
  • An additional transaction block TB is only linked to the last transaction block TB situated at the end of the transaction blockchain TBK of the object 1 following a successful validation.
  • the validation is implemented with the aid of the validation program codes VPC associated with the transactions T of the transaction block TB.
  • An additional transaction block TB is validated as valid should all transactions T contained in the transaction block TB be verified as admissible by means of their respective associated validation program code VPC.
  • the transaction blockchain TBK of an object 1 can be read by means of a read device from the object data memory 2 of the object 1 .
  • the transactions T contained in the transaction blocks TB of the read transaction blockchain TBK can be verified as admissible on the basis of their respective validation program code VPC in one possible embodiment.
  • a transaction T verified as admissible on the basis of its validation program code VPC can automatically trigger the corresponding measure MAS on the object 1 or can confirm the measure MAS being undertaken on the object 1 by third parties in one possible embodiment.
  • the measure MAS is triggered or confirmed at the time of writing the associated transaction T in the object data memory 2 of the object 1 .
  • the relevant measure MAS can also be triggered or confirmed at the time of reading the associated transaction T from the object data memory 2 of the object 1 .
  • a plurality of transaction blocks TB of the transaction blockchain TBK of an object 1 can be automatically combined to form a transaction block TB. In one possible embodiment, this is implemented as soon as a predetermined time period ends. Alternatively, the combination of a plurality of transaction blocks TB can be implemented as soon as the number of the transaction blocks TB contained in the transaction blockchain TBK reaches a threshold. Furthermore, combining the transaction blocks TB of a transaction blockchain TBK can be implemented as a response to a detected event. By way of example, a plurality of transaction blocks TB of a transaction blockchain TBK are combined automatically as soon as low memory is detected in the object data memory 2 .
  • a plurality of transaction blocks TB of a transaction blockchain TBK of the object 1 can automatically be combined in response to a user or control command in one possible embodiment.
  • the automatic combination of transaction blocks TB of the transaction blockchain TBK can avoid an overflow of the object data memory 2 .
  • each transaction block TB of a transaction blockchain TBK has a dedicated timestamp TS, a digital signature and/or proof-of-work evidence. Proof-of-work evidence is the solution to a computationally intensive problem, which should be solved as a function of the block content. Such a computationally intensive problem is also referred to as a cryptographic puzzle.
  • a transaction T may contain a program code as a smart contract.
  • the program code specifies which transactions T are admissible.
  • the linking can be implemented by means of a hash tree, for example a Merkle tree or Patricia tree, the root hash value of which is stored in a transaction block TB.
  • an object-related measure may relate to a servicing or repair of a device.
  • a transaction T belonging to the measure is entered in the transaction blockchain TBK of the object 1 in the object data memory 2 thereof.
  • the corresponding transaction T is digitally signed, for example, by the service technician who has undertaken the repair or the servicing.
  • the same device for example a drive device, may undertake a further measure, for example a self-test by the control unit present in the device. If the measure, for example the self-test, is implemented successfully, the control unit of the device can digitally sign the measure (self-test).
  • a change in ownership of the object 1 is a further example of a measure.
  • a first owner or proprietor is initially responsible for an object 1 within an installation and the responsibility subsequently changes to another second owner or proprietor.
  • a measure may contain an entry that specifies the change in ownership or the change in responsibility.
  • a smart contract program code for the change in ownership may be contained within a transaction T.
  • an owner themselves can specify specific rules according to which an ownership change, for example, is possible, or according to which a diagnostic access, for example, is possible.
  • an owner of the object 1 for example a device, can define rules that relate to the operation or the use of the device or the object 1 by way of a transaction T.
  • a maximum available power of a drive device 1 and the use duration can be defined.
  • this facilitates use-dependent licensing of the drive device or object 1 . Consequently, this type of smart contract has effects on the physical use of the relevant device, for example drive device.
  • the object data memory 2 can be provided in a module of a device.
  • This module accepts an additional transaction block TB within the transaction blockchain TBK only if the additional transaction block TB is checked as being valid.
  • the various transactions T of the transaction block TB are checked or verified in respect of their admissibility.
  • This is implemented using the transactions T present in the transaction blockchain TBK by means of their validation program codes VPC or smart contracts. Accordingly, a transaction block TB is only added to the transaction blockchain TBK if it is valid.
  • smart contracts, owners, proprietors, users of the device or object 1 can only carry out admissible actions, with the rules to this end being flexibly definable.
  • an object data memory module present in the device only accepts an additional transaction block TB if this transaction block TB is confirmed as being valid by a transaction blockchain infrastructure.
  • the object data memory module of the device checks a transaction block TB in respect of whether it has been confirmed as valid, for example by virtue of a valid solution being present for the cryptographic puzzle for this transaction block TB.
  • a smart contract SC in a drive device may be as follows:
  • the smart contract SC limits the maximum available power of a drive device 1 to 600 watts. Moreover, the smart contract SC defines a public key PK, by means of which the digital signature of an admissible change of the use restrictions can be checked.
  • FIG. 2 shows an exemplary embodiment of the system according to the invention for controlling and/or monitoring measures that can be undertaken on objects 1 or that can be undertaken by objects 1 themselves.
  • the various objects 1 are devices of an installation, which are interconnected by way of a local data bus 4 .
  • Each object 1 -i of the installation comprises an integrated object data memory 2 -i.
  • a portable write and read device 3 allows a user or operator of the installation to write data to the various object data memories 2 -i and/or read data from the various object data memories 2 -i of the various devices 1 -i. This is implemented in wireless fashion by way of a wireless communications link between the relevant device and the write/read device 3 .
  • the portable device 3 is a smartphone of a user, by means of which a corresponding use program is executed.
  • the data read from an object data memory 2 can be transferred to a distant server 7 , which has access to an associated database 8 , from the portable write/read device 3 via an access point 5 and a first network 6 in one possible embodiment.
  • the local data network of the installation can be connected to the distant server 7 via a gateway 9 and a further network 10 .
  • An associated transaction blockchain TBK is assigned to each object 1 of the installation.
  • This transaction blockchain TBK of the object 1 is situated in the local object data memory 2 -i of the relevant object 1 in one possible embodiment.
  • a twin or copy of the transaction blockchain TBK of the object 1 is situated in the database or the data memory of the distant server 7 in one possible embodiment of the system according to the invention.
  • the various objects or devices 1 -i of the installation do not comprise an integrated object data memory 2 and the transaction blockchain TBK of the object 1 is only situated in a corresponding memory region of the distant database 8 .
  • the objects 1 -i in the exemplary embodiment illustrated in FIG. 2 are hardware components, in particular devices.
  • the objects 1 -i can also be software components which, for example, are situated in a data memory of various devices of the installation and which control or monitor installation elements. By way of example, this also allows servicing measures of software components to be carried out.
  • the evaluation of the information contained in the transaction blockchain TBK can be implemented locally in situ at the respective object 1 or from a distance by the server 7 of the system.
  • a transaction blockchain TBK of an object 1 can be evaluated by a data processing unit or control unit of the system.
  • the transaction blockchains TBK which are stored in the object data memory 2 - 1 of the object 1 - 1 of the installation, can be read by the server 7 via the network 10 for the purposes of evaluating the information contained therein.
  • the server 7 receives the information stored in tamper-proof fashion about all object-related measures of the object 1 - 1 , for example servicing measures, repair measures, self-test processes and the like.
  • a service person working in the installation can transfer information about various objects or devices 1 of the installation to the central server 7 via the network 6 with the aid of the write and read device 3 .
  • step S 54 Whether the respective transaction T is valid is determined in step S 54 . Should the validation be carried out successfully, the relevant transaction T is included in the transaction block TB in step S 55 . If the transaction T is not valid, it is discarded in step S 56 .
  • step S 57 a check is carried out as to whether all transactions T were checked as valid so as to complete a transaction block TB. If this is the case, a new transaction block TB can be generated or produced for the transaction blockchain TBK of the corresponding object 1 in step S 58 . If the validation process has not yet been completed, the process returns to step S 53 and the next transaction T is checked in respect of its validity or admissibility.
  • the write process or the production process for producing a transaction block TB ends in step S 59 .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
US16/495,116 2017-03-22 2018-01-04 Method and apparatus for tamper-proof storage of information in respect of object-related measures Pending US20200089915A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP17162319.2 2017-03-22
EP17162319.2A EP3379447B1 (fr) 2017-03-22 2017-03-22 Procédé et dispositif d'enregistrement inviolable d'informations par rapport à des mesures relatives à un objet
PCT/EP2018/050200 WO2018171949A1 (fr) 2017-03-22 2018-01-04 Procédé et dispositif de stockage sécurisé lors des manipulations, d'informations relatives à des mesures liées à un objet

Publications (1)

Publication Number Publication Date
US20200089915A1 true US20200089915A1 (en) 2020-03-19

Family

ID=58412900

Family Applications (1)

Application Number Title Priority Date Filing Date
US16/495,116 Pending US20200089915A1 (en) 2017-03-22 2018-01-04 Method and apparatus for tamper-proof storage of information in respect of object-related measures

Country Status (4)

Country Link
US (1) US20200089915A1 (fr)
EP (1) EP3379447B1 (fr)
CN (1) CN110419045A (fr)
WO (1) WO2018171949A1 (fr)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111428277A (zh) * 2020-03-20 2020-07-17 中国建设银行股份有限公司 区块链数据的校验方法、装置及系统
US20200279052A1 (en) * 2017-09-25 2020-09-03 Bundesdruckerei Gmbh Datacule structure and method for storing data in a tamper-proof manner
US10803205B1 (en) * 2019-03-27 2020-10-13 Alibaba Group Holding Limited Retrieving public data for blockchain networks using trusted execution environments
US10911244B2 (en) 2019-03-27 2021-02-02 Advanced New Technologies Co., Ltd. Retrieving public data for blockchain networks using highly available trusted execution environments
US10915521B2 (en) * 2018-08-21 2021-02-09 Syniverse Technologies, Llc Blockchain gateway device and associated method of use
US11038695B2 (en) * 2019-09-02 2021-06-15 Advanced New Technologies Co., Ltd. Managing blockchain-based centralized ledger systems
US11095629B2 (en) 2019-03-29 2021-08-17 Advanced New Technologies Co., Ltd. Retrieving access data for blockchain networks using highly available trusted execution environments
US11250428B2 (en) 2020-04-22 2022-02-15 Alipay (Hangzhou) Information Technology Co., Ltd. Managing transaction requests in ledger systems
US11455631B2 (en) 2020-04-22 2022-09-27 Alipay (Hangzhou) Information Technology Co., Ltd. Managing transaction requests in ledger systems
US11455297B2 (en) 2020-04-22 2022-09-27 Alipay (Hangzhou) Information Technology Co., Ltd. Managing transaction requests in ledger systems

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111026569B (zh) * 2019-10-25 2023-09-15 贵阳信息技术研究院(中科院软件所贵阳分部) 一种在联盟链中修复指定区块数据的方法

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160164684A1 (en) * 2002-12-21 2016-06-09 International Business Machines Corporation Generation of a digital signature
US20170046792A1 (en) * 2015-08-13 2017-02-16 The Toronto-Dominion Bank Systems and method for tracking subdivided ownership of connected devices using block-chain ledgers
US20170178072A1 (en) * 2015-12-22 2017-06-22 Intel Corporation System, Apparatus And Method For Transferring Ownership Of A Smart Delivery Package
US20170295157A1 (en) * 2016-04-06 2017-10-12 Avaya Inc. Smartphone fraud-proof authorization and authentication for secure interactions
US20170345011A1 (en) * 2016-05-26 2017-11-30 Hitfin, Inc. System and method executed on a blockchain network
US20180054491A1 (en) * 2016-08-19 2018-02-22 Ca, Inc. Maintaining distributed state among stateless service clients
US20180078843A1 (en) * 2016-02-02 2018-03-22 Bao Tran Smart device
US20180097883A1 (en) * 2016-09-30 2018-04-05 The Toronto-Dominion Bank Automated implementation of provisioned services based on captured sensor data
US20180183600A1 (en) * 2016-12-28 2018-06-28 Mastercard International Incorporated Method and system for providing validated, auditable, and immutable inputs to a smart contract
US20180276666A1 (en) * 2017-03-21 2018-09-27 The Toronto-Dominion Bank Secure offline approval of initiated data exchanges
US20190052454A1 (en) * 2016-02-23 2019-02-14 nChain Holdings Limited System and method for controlling asset-related actions via a block chain
US20190288854A1 (en) * 2016-09-18 2019-09-19 Cloudminds (Shenzhen) Robotics Systems Co., Ltd. Blockchain-based identity authentication method, device, node and system
US10755226B1 (en) * 2017-02-24 2020-08-25 EMC IP Holding Company LLC Information management system using blockchain functionalities
US20210182433A1 (en) * 2016-09-09 2021-06-17 Microsoft Technology Licensing, Llc Tracing objects across different parties
US11334882B1 (en) * 2016-03-28 2022-05-17 United Services Automobile Association (Usaa) Data access management on a distributed ledger system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9967334B2 (en) * 2015-03-02 2018-05-08 Dell Products Lp Computing device configuration and management using a secure decentralized transaction ledger
US10097356B2 (en) * 2015-07-02 2018-10-09 Nasdaq, Inc. Systems and methods of secure provenance for distributed transaction databases
US20170031676A1 (en) * 2015-07-27 2017-02-02 Deja Vu Security, Llc Blockchain computer data distribution
CN106131048B (zh) * 2016-08-13 2020-05-19 广州商品清算中心股份有限公司 一种用于区块链的非信任远程交易文件安全存储系统
CN106651346A (zh) * 2016-11-28 2017-05-10 上海凯岸信息科技有限公司 基于区块链的征信数据共享与交易系统

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160164684A1 (en) * 2002-12-21 2016-06-09 International Business Machines Corporation Generation of a digital signature
US20170046792A1 (en) * 2015-08-13 2017-02-16 The Toronto-Dominion Bank Systems and method for tracking subdivided ownership of connected devices using block-chain ledgers
US20170178072A1 (en) * 2015-12-22 2017-06-22 Intel Corporation System, Apparatus And Method For Transferring Ownership Of A Smart Delivery Package
US20180078843A1 (en) * 2016-02-02 2018-03-22 Bao Tran Smart device
US20190052454A1 (en) * 2016-02-23 2019-02-14 nChain Holdings Limited System and method for controlling asset-related actions via a block chain
US11334882B1 (en) * 2016-03-28 2022-05-17 United Services Automobile Association (Usaa) Data access management on a distributed ledger system
US20170295157A1 (en) * 2016-04-06 2017-10-12 Avaya Inc. Smartphone fraud-proof authorization and authentication for secure interactions
US20170345011A1 (en) * 2016-05-26 2017-11-30 Hitfin, Inc. System and method executed on a blockchain network
US20180054491A1 (en) * 2016-08-19 2018-02-22 Ca, Inc. Maintaining distributed state among stateless service clients
US20210182433A1 (en) * 2016-09-09 2021-06-17 Microsoft Technology Licensing, Llc Tracing objects across different parties
US20190288854A1 (en) * 2016-09-18 2019-09-19 Cloudminds (Shenzhen) Robotics Systems Co., Ltd. Blockchain-based identity authentication method, device, node and system
US20180097883A1 (en) * 2016-09-30 2018-04-05 The Toronto-Dominion Bank Automated implementation of provisioned services based on captured sensor data
US20180183600A1 (en) * 2016-12-28 2018-06-28 Mastercard International Incorporated Method and system for providing validated, auditable, and immutable inputs to a smart contract
US10755226B1 (en) * 2017-02-24 2020-08-25 EMC IP Holding Company LLC Information management system using blockchain functionalities
US20180276666A1 (en) * 2017-03-21 2018-09-27 The Toronto-Dominion Bank Secure offline approval of initiated data exchanges

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200279052A1 (en) * 2017-09-25 2020-09-03 Bundesdruckerei Gmbh Datacule structure and method for storing data in a tamper-proof manner
US11669631B2 (en) * 2017-09-25 2023-06-06 Bundesdruckerei Gmbh Datacule structure and method for storing data in a tamper-proof manner
US10915521B2 (en) * 2018-08-21 2021-02-09 Syniverse Technologies, Llc Blockchain gateway device and associated method of use
US11082240B2 (en) 2019-03-27 2021-08-03 Advanced New Technologies Co., Ltd. Retrieving public data for blockchain networks using highly available trusted execution environments
US11323271B2 (en) 2019-03-27 2022-05-03 Advanced New Technologies Co., Ltd. Retrieving public data for blockchain networks using highly available trusted execution environments
US10824763B2 (en) 2019-03-27 2020-11-03 Alibaba Group Holding Limited Integrity of communications between blockchain networks and external data sources
US10803205B1 (en) * 2019-03-27 2020-10-13 Alibaba Group Holding Limited Retrieving public data for blockchain networks using trusted execution environments
US11080430B2 (en) 2019-03-27 2021-08-03 Advanced New Technologies Co., Ltd. Integrity of communications between blockchain networks and external data sources
US11449641B2 (en) 2019-03-27 2022-09-20 Advanced New Technologies Co., Ltd. Integrity of communications between blockchain networks and external data sources
US11088850B2 (en) 2019-03-27 2021-08-10 Advanced New Technologies Co., Ltd. Retrieving public data for blockchain networks using highly available trusted execution environments
US10911244B2 (en) 2019-03-27 2021-02-02 Advanced New Technologies Co., Ltd. Retrieving public data for blockchain networks using highly available trusted execution environments
US11095629B2 (en) 2019-03-29 2021-08-17 Advanced New Technologies Co., Ltd. Retrieving access data for blockchain networks using highly available trusted execution environments
US11405372B2 (en) 2019-03-29 2022-08-02 Advanced New Technologies Co., Ltd. Retrieving access data for blockchain networks using highly available trusted execution environments
US11038695B2 (en) * 2019-09-02 2021-06-15 Advanced New Technologies Co., Ltd. Managing blockchain-based centralized ledger systems
CN111428277A (zh) * 2020-03-20 2020-07-17 中国建设银行股份有限公司 区块链数据的校验方法、装置及系统
US11250428B2 (en) 2020-04-22 2022-02-15 Alipay (Hangzhou) Information Technology Co., Ltd. Managing transaction requests in ledger systems
US11455631B2 (en) 2020-04-22 2022-09-27 Alipay (Hangzhou) Information Technology Co., Ltd. Managing transaction requests in ledger systems
US11455297B2 (en) 2020-04-22 2022-09-27 Alipay (Hangzhou) Information Technology Co., Ltd. Managing transaction requests in ledger systems

Also Published As

Publication number Publication date
EP3379447B1 (fr) 2022-04-27
EP3379447A1 (fr) 2018-09-26
CN110419045A (zh) 2019-11-05
WO2018171949A1 (fr) 2018-09-27

Similar Documents

Publication Publication Date Title
US20200089915A1 (en) Method and apparatus for tamper-proof storage of information in respect of object-related measures
CN111543031B (zh) 用于控制和/或监控装置的方法和控制系统
US20210055718A1 (en) Computer-implemented method for providing data, in particular for conformity tracking
CN111445333B (zh) 区块生成方法、装置、计算机设备以及存储介质
CN111492624B (zh) 用于控制和/或监控装置的方法和控制系统
CN110971656B (zh) 区块链中的数据的安全存储
US9544300B2 (en) Method and system for providing device-specific operator data for an automation device in an automation installation
CN103580852B (zh) 安全元件以及初始化安全元件的方法和系统
CN110569251A (zh) 一种数据处理方法、相关设备及计算机可读存储介质
CN101276389B (zh) 单个物理可信平台模块内的多个逻辑可信平台模块的分离
CN111492355B (zh) 用于控制和/或监控装置的方法和控制系统
CN102549576A (zh) 审核设备
US20060218649A1 (en) Method for conditional disclosure of identity information
CN112313908B (zh) 用于控制和/或监控装置的方法和控制系统
CN113111389A (zh) 测量设备的信息管理方法及装置
CN111090581A (zh) 智能合约测试方法、装置、计算机设备和存储介质
CN112597158A (zh) 数据匹配方法、装置、计算机设备和存储介质
CN115454974A (zh) 一种产品检验方法、系统、终端及计算机存储介质
CN111869165B (zh) 用于控制和/或监控装置的方法和控制系统
KR20140048094A (ko) 이동 단말 장치 칩 프로그래밍을 위한 방법
JP6477553B2 (ja) プログラム開発支援装置、プログラム開発支援プログラムおよびプログラム開発支援方法
US20220114276A1 (en) Controlling a data network with respect to a use of a distributed database
CN111552989A (zh) 基于区块链的业务数据处理方法、装置、设备和存储介质
US11909821B2 (en) Method for processing application programs in a distributed automation system
CN112350868A (zh) 开墙处理方法、装置、服务器、系统及可读存储介质

Legal Events

Date Code Title Description
AS Assignment

Owner name: SIEMENS AKTIENGESELLSCHAFT, GERMANY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FALK, RAINER;REEL/FRAME:050686/0635

Effective date: 20190930

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: ADVISORY ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: ADVISORY ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

ZAAB Notice of allowance mailed

Free format text: ORIGINAL CODE: MN/=.

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED